Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 09:59
Static task
static1
Behavioral task
behavioral1
Sample
2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe
-
Size
876KB
-
MD5
2f1dc5030efcb81959182c0382ad8d74
-
SHA1
901cde94badc1478b973d85c5862e5fe260cfa7f
-
SHA256
800900c169d3f7ab56983c0406a534b22a5652b1d3507b5e879adbb2bc2229f3
-
SHA512
eda73fd95f95b989a6f69888268b7c91291c22e061237a78e2ab1a704c7528645e0623b46fa7710b27d27f3bbfb15bff5fa81d47e88447749789c8d94c2c18d0
-
SSDEEP
12288:+QJ/WFun+/d0tnm2l8w58cBwbPh+b7ji75qFacYboBioTBzWj6G3u3EIO74qt:PWFY+ImI8hcqzQb7j6UFacrBpByuDgt
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023c7a-56.dat family_ardamax -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation aa.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation a.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation alalal.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HAWF.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation aaa.exe -
Executes dropped EXE 5 IoCs
pid Process 2240 aaa.exe 1800 aa.exe 1420 a.exe 2704 alalal.exe 468 HAWF.exe -
Loads dropped DLL 17 IoCs
pid Process 2704 alalal.exe 468 HAWF.exe 468 HAWF.exe 468 HAWF.exe 2148 NOTEPAD.EXE 2152 NOTEPAD.EXE 2152 NOTEPAD.EXE 2152 NOTEPAD.EXE 4452 NOTEPAD.EXE 4068 NOTEPAD.EXE 4452 NOTEPAD.EXE 4452 NOTEPAD.EXE 4068 NOTEPAD.EXE 4068 NOTEPAD.EXE 2148 NOTEPAD.EXE 2148 NOTEPAD.EXE 696 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HAWF Agent = "C:\\Windows\\SysWOW64\\28463\\HAWF.exe" HAWF.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\HAWF.001 alalal.exe File created C:\Windows\SysWOW64\28463\HAWF.006 alalal.exe File created C:\Windows\SysWOW64\28463\HAWF.007 alalal.exe File created C:\Windows\SysWOW64\28463\HAWF.exe alalal.exe File created C:\Windows\SysWOW64\28463\key.bin alalal.exe File created C:\Windows\SysWOW64\28463\AKV.exe alalal.exe File opened for modification C:\Windows\SysWOW64\28463 HAWF.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 696 468 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alalal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HAWF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 39 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38177476-E73F-415A-0180-E5CCDEEAC0B8}\InProcServer32\ = "%SystemRoot%\\SysWow64\\msxml3.dll" HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{296984C0-B38C-39F7-736E-2565948F8689}\1.0\0 HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{296984C0-B38C-39F7-736E-2565948F8689}\1.0\0\win32 HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{296984C0-B38C-39F7-736E-2565948F8689}\1.0\0\win64\ = "C:\\Program Files\\Microsoft Office\\root\\Office16\\ONBttnIE.dll\\106" HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{296984C0-B38C-39F7-736E-2565948F8689}\1.0\HELPDIR HAWF.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings aa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38177476-E73F-415A-0180-E5CCDEEAC0B8} HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38177476-E73F-415A-0180-E5CCDEEAC0B8}\InProcServer32 HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38177476-E73F-415A-0180-E5CCDEEAC0B8}\Version\ = "3.0" HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38177476-E73F-415A-0180-E5CCDEEAC0B8}\TypeLib\ = "{296984C0-B38C-39F7-736E-2565948F8689}" HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38177476-E73F-415A-0180-E5CCDEEAC0B8}\Version\ HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38177476-E73F-415A-0180-E5CCDEEAC0B8}\VersionIndependentProgID\ = "Msxml2.FreeThreadedDOMDocument" HAWF.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings aaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{296984C0-B38C-39F7-736E-2565948F8689}\1.0\0\win32\ HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{296984C0-B38C-39F7-736E-2565948F8689}\1.0\HELPDIR\ HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38177476-E73F-415A-0180-E5CCDEEAC0B8}\ProgID\ HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{296984C0-B38C-39F7-736E-2565948F8689}\1.0\ = "Microsoft OneNote 15.0 Extended Type Library" HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38177476-E73F-415A-0180-E5CCDEEAC0B8}\TypeLib HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{296984C0-B38C-39F7-736E-2565948F8689}\1.0\FLAGS HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38177476-E73F-415A-0180-E5CCDEEAC0B8}\VersionIndependentProgID\ HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{296984C0-B38C-39F7-736E-2565948F8689}\ HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{296984C0-B38C-39F7-736E-2565948F8689}\1.0\0\win32\ = "C:\\Program Files\\Microsoft Office\\root\\VFS\\ProgramFilesX86\\Microsoft Office\\Office16\\ONBttnIE.dll\\106" HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{296984C0-B38C-39F7-736E-2565948F8689}\1.0\0\win64\ HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{296984C0-B38C-39F7-736E-2565948F8689}\1.0\0\ HAWF.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38177476-E73F-415A-0180-E5CCDEEAC0B8}\ = "Akizo Azexikis Class" HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{296984C0-B38C-39F7-736E-2565948F8689}\1.0\FLAGS\ HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38177476-E73F-415A-0180-E5CCDEEAC0B8}\TypeLib\ HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38177476-E73F-415A-0180-E5CCDEEAC0B8}\InProcServer32\ HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{296984C0-B38C-39F7-736E-2565948F8689}\1.0\ HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{296984C0-B38C-39F7-736E-2565948F8689}\1.0\0\win64 HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{296984C0-B38C-39F7-736E-2565948F8689}\1.0 HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{296984C0-B38C-39F7-736E-2565948F8689}\1.0\FLAGS\ = "0" HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38177476-E73F-415A-0180-E5CCDEEAC0B8}\Version HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38177476-E73F-415A-0180-E5CCDEEAC0B8}\VersionIndependentProgID HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38177476-E73F-415A-0180-E5CCDEEAC0B8}\ProgID HAWF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38177476-E73F-415A-0180-E5CCDEEAC0B8}\ProgID\ = "Msxml2.FreeThreadedDOMDocument" HAWF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{296984C0-B38C-39F7-736E-2565948F8689} HAWF.exe -
Opens file in notepad (likely ransom note) 4 IoCs
pid Process 2152 NOTEPAD.EXE 4452 NOTEPAD.EXE 4068 NOTEPAD.EXE 2148 NOTEPAD.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 468 HAWF.exe Token: SeIncBasePriorityPrivilege 468 HAWF.exe Token: SeIncBasePriorityPrivilege 468 HAWF.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 468 HAWF.exe 468 HAWF.exe 468 HAWF.exe 468 HAWF.exe 468 HAWF.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3736 wrote to memory of 2152 3736 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 86 PID 3736 wrote to memory of 2152 3736 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 86 PID 3736 wrote to memory of 2152 3736 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 86 PID 3736 wrote to memory of 2240 3736 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 87 PID 3736 wrote to memory of 2240 3736 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 87 PID 3736 wrote to memory of 2240 3736 2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe 87 PID 2240 wrote to memory of 4452 2240 aaa.exe 88 PID 2240 wrote to memory of 4452 2240 aaa.exe 88 PID 2240 wrote to memory of 4452 2240 aaa.exe 88 PID 2240 wrote to memory of 1800 2240 aaa.exe 89 PID 2240 wrote to memory of 1800 2240 aaa.exe 89 PID 2240 wrote to memory of 1800 2240 aaa.exe 89 PID 1800 wrote to memory of 4068 1800 aa.exe 90 PID 1800 wrote to memory of 4068 1800 aa.exe 90 PID 1800 wrote to memory of 4068 1800 aa.exe 90 PID 1800 wrote to memory of 1420 1800 aa.exe 91 PID 1800 wrote to memory of 1420 1800 aa.exe 91 PID 1800 wrote to memory of 1420 1800 aa.exe 91 PID 1420 wrote to memory of 2704 1420 a.exe 92 PID 1420 wrote to memory of 2704 1420 a.exe 92 PID 1420 wrote to memory of 2704 1420 a.exe 92 PID 1420 wrote to memory of 2148 1420 a.exe 93 PID 1420 wrote to memory of 2148 1420 a.exe 93 PID 1420 wrote to memory of 2148 1420 a.exe 93 PID 2704 wrote to memory of 468 2704 alalal.exe 94 PID 2704 wrote to memory of 468 2704 alalal.exe 94 PID 2704 wrote to memory of 468 2704 alalal.exe 94 PID 468 wrote to memory of 3240 468 HAWF.exe 106 PID 468 wrote to memory of 3240 468 HAWF.exe 106 PID 468 wrote to memory of 3240 468 HAWF.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f1dc5030efcb81959182c0382ad8d74_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\hello.txt2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\aaa.exe"C:\Users\Admin\AppData\Local\Temp\aaa.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\hello.txt3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\aa.exe"C:\Users\Admin\AppData\Local\Temp\aa.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\hello.txt4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:4068
-
-
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\alalal.exe"C:\Users\Admin\AppData\Local\Temp\alalal.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\28463\HAWF.exe"C:\Windows\system32\28463\HAWF.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 10927⤵
- Loads dropped DLL
- Program crash
PID:696
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\28463\HAWF.exe > nul7⤵
- System Location Discovery: System Language Discovery
PID:3240
-
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\hello.txt5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2148
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 468 -ip 4681⤵PID:4524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5d73d89b1ea433724795b3d2b524f596c
SHA1213514f48ece9f074266b122ee2d06e842871c8c
SHA2568aef975a94c800d0e3e4929999d05861868a7129b766315c02a48a122e3455d6
SHA5128b73be757ad3e0f2b29c0b130918e8f257375f9f3bf7b9609bac24b17369de2812341651547546af238936d70f38f050d6984afd16d47b467bcbba4992e42f41
-
Filesize
813KB
MD5e2ebdccb8a3e4244261ca5ebb3d0f8a6
SHA1c70105a7b64287c4e53548b54be6fe9f242f95f0
SHA2562fc377e680565a454d7dc0e04c042dccc2a6306f4368d93de59d69821842457d
SHA512208aa92a162e231b59730d1c4636ea2826920c5ecf94cc062640c1bfe792e6db5091653add3628c0d624185fa0e4a2384825dd1422aa4406ade0ed13cca148cd
-
Filesize
834KB
MD53e5692e2d63f4b33d6a7fccc78fe451c
SHA12c4c3487971a5255fc939af71d1946b7cc61da62
SHA2562ae2e6e62602a9129be56ee9a0459f35fe1e09885718e009b317e8f5db72cf88
SHA512000855c58488f519b70c29612547edd82212badc65dc720bea5209cf3fd733410191ec6862124831ac4a3fd40ab556f92165e6e91dfc1b14e569414cdb432cf4
-
Filesize
855KB
MD592e49800179523b787d6a68b6f588fde
SHA1999f3356bc22880b2542768e7470c9c6c067af41
SHA2565463b407f2cf32fbc61d5539b5e174b12823c95433c0c0e1f72b8412e7a108f0
SHA51249ee8cb83611157106bfe1ae11a1cb6ee880d4f1a0a650025c56116c4f055f8fd6341cd4fdd8e78604ac8a8a34e9a47144e0a3ce0c30281e100e2577e4b36260
-
Filesize
783KB
MD5d8e63038cd315c939bceb4333959c8ff
SHA12bc6b710064dfa44f13dec3b0631c9203b5a484f
SHA2565bb8b60c931e2dc1b3080471ffc9b0612d1b5d9055a63feb07fb3db5d8f4d6cf
SHA51254f8a2403496097b30bb8cf444dec7b3868dc57b80d8d96b385d406eb5a2482711cb2ec8bdfcb8b49e63784973513dee5187996af996379a416fbd8602b2ba5b
-
Filesize
40B
MD50818a2155823f8c4d1e6b2a24d4b86ac
SHA13764085a15922b359b0d4a714c10dbd020f23f36
SHA256a49cafc9b464f56a529f917851d7f292969f157dffcc2392006bbe15811b489a
SHA512be3de98b5e25cccf6e50c6d78bae9fa00af54482d25e2caf1995f3808d4247d8f5251d535e08ee84c5d9b22e9bdad5d4765ba5ca8fdeaf672cda42eb7ded571d
-
Filesize
457KB
MD597eee85d1aebf93d5d9400cb4e9c771b
SHA126fa2bf5fce2d86b891ac0741a6999bff31397de
SHA25630df6c8cbd255011d80fa6e959179d47c458bc4c4d9e78c4cf571aa611cd7d24
SHA5128cecc533c07c91c67b93a7ae46102a0aae7f4d3d88d04c250231f0bcd8e1f173daf06e94b5253a66db3f2a052c51e62154554368929294178d2b3597c1cca7e6
-
Filesize
446B
MD512f3f808506762ba31b6ab8ae9bef99c
SHA14aae9bef8ddd534e11a87f1be45a9be7cad3c4a4
SHA2567b76928bbb5948e2fb83915515b9d5ad0c596d5f5b2d46d2dc300089759f6be0
SHA512dc0465a96d52bfc52cc3a6182dfb9200f6a7b1b42a0d21f824089dc517376575e16117ebe38020df695d66a57580fd81de9929a3aa4b4575d580a33303cf616c
-
Filesize
8KB
MD535b24c473bdcdb4411e326c6c437e8ed
SHA1ec1055365bc2a66e52de2d66d24d742863c1ce3d
SHA2564530fcc91e4d0697a64f5e24d70e2b327f0acab1a9013102ff04236841c5a617
SHA51232722f1484013bbc9c1b41b3fdaf5cd244ec67facaa2232be0e90455719d664d65cae1cd670adf5c40c67f568122d910b30e3e50f7cc06b0350a6a2d34d371de
-
Filesize
5KB
MD5a8e19de6669e831956049685225058a8
SHA16d2546d49d92b18591ad4fedbc92626686e7e979
SHA25634856528d8b7e31caa83f350bc4dbc861120dc2da822a9eb896b773bc7e1f564
SHA5125c407d4aa5731bd62c2a1756127f794382dc5e2b214298acfa68698c709fbbe3f2aa8dbdcbef02ed2a49f8f35969959946e9f727895bdca4500d16e84f4ef2e8
-
Filesize
646KB
MD5b863a9ac3bcdcde2fd7408944d5bf976
SHA14bd106cd9aefdf2b51f91079760855e04f73f3b0
SHA2560fe8e3cd44a89c15dec75ff2949bac1a96e1ea7e0040f74df3230569ac9e37b0
SHA5124b30c3b119c1e7b2747d2745b2b79c61669a33b84520b88ab54257793e3ed6e76378dea2b8ff048cb1822187ffdc20e921d658bb5b0482c23cfa7d70f4e7aa1a
-
Filesize
106B
MD5a7803747d88ef30694f734728947208f
SHA166d940969be262153388f57209f60b4840f78fa5
SHA2565a155301048acd3ee2e64682ca9ea92fed5a5821515ad1b94f0f9555f9198de4
SHA5127bc14fdc47f372bfa00d627afd3bbd76f4efdad86727b198ba85c151a5b6d25466836ac4f87a228128eb0d16254449b9e26e731ce781b6003a83892dabb4c185